Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha July 2019 Assessment Details and Submission Guidelines Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual...

1 answer below »
assignment 1


Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha July 2019 Assessment Details and Submission Guidelines Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual Assessment Assessment Title Analysis of Future Wireless Technologies Purpose of the assessment (with ULO Mapping) b. Utilise standards-based technologies used in various networks; c. Test and compare the performance of various wireless networks; Weight 20% Total Marks 30 Word limit 1500 minimum Due Date Week 7 Sunday 11:55 PM 1st of September 2019 Submission Guidelines ● All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ● The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ● Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension ● If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct ● Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha July 2019 Assignment Description You are a new network engineer at MindBlowing Pty Ltd in Australia. Your company wishes to extend their connectivity throughout their offices (located at level 3 of one building). Most of the office workers are using laptops and mobile phones to communicate. They often need to share images and data amongst themselves. The company also has another office in the adjacent building with a line of sight view. Overall, the office workers are moving continuously, and they need full connectivity and accessibility to the network at any given point of time at any place. Your company director is keen to hear your opinion on available wireless technologies. The director is also wary of the security concerns of the wireless technologies as she/he has read on the technical magazines. Your task is to select at least two of the following wireless technologies:  ZigBee  WiMax  Bluetooth  RFID  WLAN  IoT  5G Then you will report to your director on: 1. Introduction to the selected technologies 2. Case examples of successful use of the selected technologies 3. The operational mechanism of selected technologies 4. Potential benefits to the business using the selected technologies 5. Security vulnerabilities of the selected technologies 6. Resolution and recommendations for the business. Marking Guide: Marks are allocated as indicated on each question, taking the following aspects into account: Criteria Description Marks Section 1- introduction and case examples Introduction to wireless technologies and their pros and cons. Use of case examples to motivate the business director. 5 Section 2 – operational mechanisms Describe how the selected wireless technologies operate – in particular for the aforementioned business environment (and their potential benefits) 10 Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha July 2019 Section 3 – Security vulnerabilities and resolutions Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing. 10 Report structure Inadequate structure, careless presentation, poor writing, word limits 3 Reference style (IEEE) Minimum 5 Proper different referencing resources 2 Marking Rubric for Exercise Answers[SS1] Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail< 50% excellent very good good satisfactory unsatisfactory introductio n and case examples /5 explanation is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent and convincing adequate cohesion and conviction argument is confused and disjointed operational mechanism and security resolutions /20 the presented solution demonstrated an extreme degree of sophistication and effectiveness to secure and/or manage wlan the presented solution demonstrated a high degree of sophistication and effectiveness to secure and/or manage wlan the presented solution demonstrat ed an average degree of sophisticati on and effectivene ss to secure and/or manage wlan the presented solution demonstrate d a low degree of sophisticatio n and effectiveness to secure and/or manage wlan the presented solution demonstrated a poor degree of sophistication and effectiveness to secure and/or manage wlan. reference style /2 clear styles with excellent source of references. clear referencing/ style generally good referencing /style unclear referencing/s tyle lacks consistency with many errors prepared by: a/prof tony jan moderated by: dr sanjeeb shrestha july 2019 report structure and report presentatio n /3 proper writing. professionally presented properly written, with some minor deficiencies mostly good, but some structure or presentatio n problems acceptable presentation poor structure, careless presentation 50%="" excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introductio="" n="" and="" case="" examples="" 5="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" operational="" mechanism="" and="" security="" resolutions="" 20="" the="" presented="" solution="" demonstrated="" an="" extreme="" degree="" of="" sophistication="" and="" effectiveness="" to="" secure="" and/or="" manage="" wlan="" the="" presented="" solution="" demonstrated="" a="" high="" degree="" of="" sophistication="" and="" effectiveness="" to="" secure="" and/or="" manage="" wlan="" the="" presented="" solution="" demonstrat="" ed="" an="" average="" degree="" of="" sophisticati="" on="" and="" effectivene="" ss="" to="" secure="" and/or="" manage="" wlan="" the="" presented="" solution="" demonstrate="" d="" a="" low="" degree="" of="" sophisticatio="" n="" and="" effectiveness="" to="" secure="" and/or="" manage="" wlan="" the="" presented="" solution="" demonstrated="" a="" poor="" degree="" of="" sophistication="" and="" effectiveness="" to="" secure="" and/or="" manage="" wlan.="" reference="" style="" 2="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing="" style="" unclear="" referencing/s="" tyle="" lacks="" consistency="" with="" many="" errors="" prepared="" by:="" a/prof="" tony="" jan="" moderated="" by:="" dr="" sanjeeb="" shrestha="" july="" 2019="" report="" structure="" and="" report="" presentatio="" n="" 3="" proper="" writing.="" professionally="" presented="" properly="" written,="" with="" some="" minor="" deficiencies="" mostly="" good,="" but="" some="" structure="" or="" presentatio="" n="" problems="" acceptable="" presentation="" poor="" structure,="" careless="">
Answered Same DayAug 21, 2021BN303

Answer To: Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha July 2019 Assessment Details and...

Ankit answered on Sep 01 2021
145 Votes
Analysis of Future Wireless Technologies
Student_Name:
Introduction:
Wireless technology is the way of Internet access but without the use of wires and cables. This technology allows two or more systems to access the Internet even from distance and that too without any wire and cables. We can broadly
classify Internet access in three domains: Broadband, Wi-Fi and Dial-up. Broadband is installed at our homes with a DSL or via modem. But it is very expensive and not feasible in remote areas. We can go for wireless Wi-Fi, but it offers very restricted range. And regarding dial-up, it is very lagged and old fashioned [1].
Assuming I am newly assigned network engineer at MindBlowing Pvt. Ltd in Australia. I am going to present my opinion on two new emerging wireless technologies:
1. WiMax
2. 5G
Based on their operational mechanism and operational benefits, the company director can select the best suitable out of them to be implemented in their infrastructure.
WiMax:
Worldwide Interoperability i.e. WiMax is using most challenging standard which is “LTE”. It is based on 4G the “fourth generation”. WiMax is alike to Wi-Fi because it allows the connection to Internet without wires. But WiMax has upper hand than Wi-Fi. It is because Wi-Fi has low range like limited to a building or a block and WiMax range can go as far as a cellular network plus with the benefit of broadband technology i.e. high speed Internet access. We can critically call it as “Wireless broadband”.
Advantages of WiMax:
1) One single router can benefit hundred users.
2) Provides high speed internet access
3) The signal range is very far just like a cellular range
4) Under a line of sight, it gives a speed of 10 Mbps upto 10 Kms.
5) No cable/wire costing, no need of multiple routers
Disadvantages of WiMax:
1) For the long distance coverage, line of sight is much needed.
2) Highly dependent on the external weather conditions, like rains can barge the wireless signal.
3) Obtrusion may occur if multiple wireless routers are used.
4) Installation and operational cost is quite high.
5) WiMax is very potential intensive technology and thus demand powerful electrical support [2], [1].
One real use case of WiMax is “Environmental Monitoring”. To monitor the natural catastrophes incidents, a successful and dependent monitoring is needed. And for this, various immutable and mutable stations (sensors and cameras) are fixed that would send the data in real time to the systems with the use of both immutable and mutable WiMax. Then the collected data is sent in real time to the environmental monitoring centre with WiMax [9].
5G:
5G can be seen as the new boom to the next generation of mobile Internet technology. It provides faster Internet spend and much more dependable Internet connections for mobile phones and other hands on devices than any other technology. 5G furnish the old Internet connections that provide average low speed downloads, with high speed of around 1GBps. It implements both revolutionary network technology and up...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here